![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
I have not looked into it for a while but I believe their servers broker a direct connection between the client and server.
I have not looked into it for a while but I believe their servers broker a direct connection between the client and server.
I always wonder why some people are so dedicated to Jellyfin. Even if JF had full feature and experience parity, it would still not have secure remote access the way Plex does. There is no need to port forward or NAT Plex for external access. With the threat landscape the way it is today, that is worth a lot.
Checksums wouldnt work well for their purposes if they could easily be made to match any desired checksum. It’s one way math.
I was interested in Apple’s approach where they would look at checksums of the images to see if they matched checksums of known CSAM. Its trivial to defeat by changing even a single pixel, but it’s the only acceptable way to implement this scanning. Any other method is an overreach and a huge invasion of privacy.
For it to be tax deductible it needs to be a donation to a registered 501©(3) where no goods or services were received in exchange for the donation.
I was into film and digital photography for a while before I met my current girlfriend. Her family has always been into birdwatching. Once I realized the new challenge of photographing birds it was a whole new world of photography for me. It’s definitely part of my identity at this point. Enjoy this great blue heron.
It’s done by IP address not phone or laptop GPS.
Plex, as a company, definitely is aware of what items are in your library but streams don’t go through the Plex servers unless you use the Plex proxy service which is enabled by default but only used when the client connection speed is too slow to use the desired streaming setting.
Everyone who accesses their Plex externally should use app.plex.tv rather than NAT/port forwarding unless you’re also doing IP whitelisting on the NAT (not feasible for most remote access scenarios, as IPs are dynamic in most cases). Jellyfin should never be exposed externally.
I work in a highly regulated sector of IT and have learned that even the most robust software will have serious exploits at some point.